Modern C and initializing an array
subethasoftware.com·1d
🗂Data structures
SAT problems are kind of cool
blog.karanjanthe.me·2d·
Discuss: Hacker News
🧮SMT Solvers
Why it took 4 years to get a lock files specification
snarky.ca·8h·
🔄Language Evolution
Evaluating Gemini 2.5 Deep Think's math capabilities
epoch.ai·23h·
Discuss: Hacker News
🎯Performance Proofs
Building a Streaming Data Pipeline with Kafka and Spark: Real-Time Analytics Implementation Guide
dev.to·1d·
Discuss: DEV
🌊Apache Kafka
IASC: Interactive Agentic System for ConLangs
arxiv.org·1d
🌳Context free grammars
I analyzed 70 Data Breaches. Three controls would have stopped 65% of them
securityblueprints.io·1d·
Discuss: Hacker News
🔐Capability Systems
Exponential Error Bounds for Information Bottleneck Source Coding Problems
arxiv.org·1d
📐Compression Bounds
Item Patterns and Struct Await
noratrieb.dev·1d·
Discuss: Hacker News
🦀Rust Macros
Zelos Tech Manages Hundreds of Millions of Files for Autonomous Driving with JuiceFS
dev.to·1d·
Discuss: DEV
💾Proxmox Storage
Show HN: An open-source starter kit for implementing OWASP ASVS 5.0
github.com·16h·
Discuss: Hacker News
🔓Open Source Software
Operable Software
ferd.ca·23h·
Discuss: Hacker News
👁️System Observability
Is the End of Detection-Based Security Here?
thenewstack.io·20h
🎯Threat Hunting
Effective Web Scraping with Python: Building a Robust Data Pipeline for Price Monitoring
dev.to·1d·
Discuss: DEV
🕵️Feed Discovery
Reverse Engineering keyboard firmware with Ghidra
blog.usedbytes.com·2d·
Discuss: Hacker News
🔓Reverse engineering
Proposal: Deconfig – Distributed Git Infrastructure with Durable Objects
github.com·1d·
Discuss: Hacker News
📦Git LFS
Sorting encrypted data without decryption: a practical trick
dev.to·21h·
Discuss: DEV
🔐Hash Functions
Which Heads Matter for Reasoning? RL-Guided KV Cache Compression
arxiv.org·1d
📼Cassette Combinators
The Library Method: Understanding @cache
dev.to·1d·
Discuss: DEV
Cache Theory
An enough week
blog.mitrichev.ch·1d·
📈Linear programming